Internet Chapter 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

classless routing system

(CIDR) a notation system that allows network administrators to expand the number of network nodes assigned to an IP address.

war driving

(LAN jacking) the act of driving around with a laptop, antenna, and wireless card, looking for unsecured wireless networks to access.

network card

(NIC) an internal expansion card that enables a computer or other device to access a network.

network interface card (NIC)

(network card) an internal expansion card that enables a computer or other device to access a network.

LAN jacking

(war driving) the act of driving around with a laptop, antenna, and wireless card, looking for unsecured wireless networks to access.

network firewall

a combination of hardware and software that filters traffic between private networks or between a private network and a public network such as the internet.

routing table

a data table stored on the router or on a network computer that includes a list of routes to network addresses.

gateway

a hardware device or software that runs on a mainframe computer, a server, an individual workstation, or a router.

resolving

a hierarchy of servers used to translate domain names into IP addresses in a process called resolving the domain name.

token ring

a network that passes tokens clockwise in a circle from node to node.

Classless Inter-Domain Routing (CIDR)

a notation system that allows network administrators to expand the number of network nodes assigned to an IP address.

internet exchange point (IXP)

a physical infrastructure that enables ISPs to communicate among their networks, which limits the upstream traffic and ISP must handle.

smart card

a plastic card the size of a credit card, contains memory chips that can store special access codes or biometric information.

transceiver

a single component that both sends and receives transmissions.

Metropolitan Area Exchange (MAE)

a specific type of IXP; provides a high-speed Ethernet connection within a metropolitan area.

MAC (Media Access Control) address

a unique physical address.

tracert utility

a utility that you can use to trace hops from your computer to another computer over the internet. this is the Windows version.

virtual conversation

a video chat using services such as FaceTime.

web conferencing

a virtual meeting conducted using a browser and the web.

hijacking

a website occurs when hackers redirect a URL to an alternate website

location-based service (LBS)

a wireless service offered to customers based on their physical location

dynamic routing

allows a router to determine the best route between two nodes automatically and stores this information in a routing table.

virtual meeting

allows collaboration between participants, such as a group of employees by allowing invitees to log onto their network and sign in to a meeting .

Bluetooth

an example of short-range RF technology that sends and receives wireless transmissions between devices such as computers, smartphones, tablets, headsets, and more.

video conferencing

an expanded virtual meeting that sometimes includes hundreds or thousands of participants.

hub

an inexpensive hardware device used to connect multiple nodes on the same network.

bridge

an intelligent connectivity device with one input port and one output port that connects two segments on the same LAN or two separate LANs.

data switch

an intelligent device that also interprets MAC address and filters and forwards packets to other network segments.

router

an intelligent device with multiple ports.

port

an opening in a device that connects it to another device.

IP network

another name for a network running TCP/IP.

transmission media

are the communication media - physical or wireless - used to carry these transmissions.

classful routing system

assigned IP addresses by classifying networks as Class A through Class E to maximize the number of available IP addresses for each network.

distributed denial of services (DDos)

attacks, involve sending a continuous stream of server requests that ultimately overload a server's capacity to respond

intelligent hub

can perform a variety of tasks, such as filtering data or permitting a network administrator to monitor hub traffic.

passive hub

cannot determine how to direct a packet; it simply sends the same signal to all its connected nodes or segments.

private peering

connections to each others networks; enable internet traffic to bypass congested public peering points.

metropolitan area network (MAN)

connects clients and servers in a region that is larger than a single office or building.

coaxial cable

consists of a single copper wire surrounded by insulating material, woven or braided material, and a plastic outer covering.

peer-to-peer LAN

consists of a small number of computers and devices (generally 10 or fewer) linked together.

DNS namespace

consists of all of the information in the DNS databases, including the top-level domain, country code top-level domain, domain name, and IP address information.

twisted-pair cable

consists of insulated copper wires twisted around each other in pairs and then enclosed in a plastic material.

client/server network

consists of multiple computers and devices or workstations (clients), one or more servers, and other devices such as printers.

authoritative servers

contain the IP information for the TLD and ccTLD domains and their registrants.

fiber-optic cable

contains glass fibers surrounded by a layer of glass cladding and a protective outer jacket, is used to carry voice, video, and data transmissions over very long distances.

disaster recovery plan

covers how an organization deals with a natural or man-made disaster to ensure the organization's viability.

rogue WLAN

created by installing a wireless router that uses network resources and exposes the network to security threats.

octet

each 8-bit number in the IP address.

node

each computer or another device on a LAN. communicate with each other with cables or wireless media such as radio waves.

logical address

each node on an IP network also has a logical address, called an IP address,

accredited registrars

ensure that an organization's unique domain name appears on the appropriate DNS servers for a small annual fee.

wireless personal area networks (WPANs)

have a range approximately 33 feet or less. (use Bluetooth)

cloud storage

involves saving files and data to a folder on the cloud, rather than on a computer hard drive.

biometrics

involves using devices to measure biological data to identify a user.

body area network (BAN)

is a set of devices that function as a network on a human body.

root zone file

lists the addresses of all the TLD and ccTLD (country code top-level domain) DNS servers.

converged network

modern networks.

segments

multiple groups of computers or devices that share a common function.

wide area network (WAN)

network covering a very wide geographical area - can be a single network or multiple connected LANs located across the country or around the world.

hop

occurs when a packet travels to the next internet router.

caching servers

operated by ISPs and company IT departments containing stored domain name and IP address information developed from previous domain name resolution inquiries.

network service providers (NSPs)

provide the public and private network infrastructure for the internet that enables wireless, cellular, and other capabilities.

root name servers

publish a directory of the next level DNS servers, called the root zone file.

social engineering

relies on a network user divulging his or her username or password to someone, or allowing someone to enter a network facilities room without the proper authorization.

static routing

routes packets over specific paths between nodes.

global positioning system (GPS)

satellite network and receivers mounted in automobiles or placed in mobile phones, watches, tablets, or other handheld devices.

tokens

small packets of data.

access method

specifies how data travels from node to node across the network.

geosocial networking

term used to describe the combination of LBS with social networking providers.

throughput

the amount of data that can travel from one node to another node in a specified amount of time.

physical topology

the arrangement of computers and mobile devices, printers, and other devices.

IPv6

the current IP standard; lengthens IP addresses from 32 bits to 128 bits and thus increases the number of available IP addresses from the IPv4 standard, which is replaced.

peering

the exchange of internet traffic and router information between NSPs and ISPs at an exchange point, such as an IXP.

shared registration system (SRS)

the registration system that allows private companies to handle the registration of domain names.

TCP/IP stack

the set of standard internet protocols on which communications across the internet and many private networks rely.

logical topology

the way in which data travels between nodes.

cellular transmissions

travel wirelessly over land cells, using transceivers, or cell sites.

radio frequency (RF) transmissions

use broadcast radio waves to transmit data over short distances, such as between two smartphones.

Infrared (IR) transmissions

use infrared light signals as a short-range transmission medium between computers and devices equipped with infrared ports.

near field communication (NFC) transmission

use radio waves to connect devices that are touching or nearby (usually within 10 cm).

network operating system

used by a client/server LAN to manage data storage, printer access, communications, Internet connections, security, and network administration.

IP telephony

uses TCP/IP and packet switching to send voice transmissions over a private or public IP network.

Voice over IP (VoIP)

uses TCP/IP and packet switching to send voice transmissions over a private or public IP network.

Wi-Fi network

uses a wireless medium - such as radio frequency transmissions - to connect computers and mobile devices, printers, and other devices.

wireless LAN (WLAN)

uses a wireless medium - such as radio frequency transmissions - to connect computers and mobile devices, printers, and other devices.

spoofing

when a hacker accesses a network to set up a fake website or send mail that looks like it is coming from an internal server.

pair

you must pair devices for them to work together with Bluetooth. pairing devices typically requires modifying the device's settings, and can require a device ID or other information to complete the pairing.


Conjuntos de estudio relacionados

DAY 1 Chem Eng Boards - pt. 8 (701-800+)

View Set

Chapter 32 The Reproductive Systems

View Set

BDT Test - Unit 1: Achieving Business Success

View Set

Intro to coding : Automated Coding, coding Encoders

View Set

Computer Applications: Chapter 6-Study Guide

View Set